Feeds

Be a composer

A short cut for developers – and others

Intelligent flash storage arrays

It's not programming any more - it's composition. At least this is what Andy Bailey, VP of global marketing at Attunity, argues. With the release this week of version 2.1 of InFocus, Bailey says Attunity has introduced 'the first iteration of developer tools' which will enable customers to build their own applications on the InFocus platform.

"InFocus is a relatively new product - we only put out the first major release in September 2006 and there were no graphical tools with it then. But version 2.1 gives developers graphical tools to compose workplace applications using standard components such as XML and JSP," Bailey explains.

Attunity, based in Boston, MA, made its name in the data connection market producing change data capture (CDC) adapters for major IT players from IBM and HP to Microsoft and Oracle. It only recently moved into the emerging market for service-based workplace applications with InFocus, building on its knowledge of data connectivity. Workplace applications aim to improve collaboration by bringing data sources and services together in real time.

Version 2.1 of InFocus features two specific tools - Workplace Designer, which is aimed at business analysts for building front-end clients - and Composition Designer - which is used by technical development staff to build server-based services.

"Workplace Designer gives the analyst a quick way to build a front end. It can, for example, define frames and items such as RSS feeds with the help of the end user. While Composition Designer uses the Ajax model and standard technologies to compose the back-end services," says Bailey. Attunity calls this Cojax from 'Composition Of JSP and XML'.

He goes on to say that Cojax can cut application development time to days rather than months. "Rapid development is the core of what we are doing with InFocus and we see application composition as the way to do this. It is the direction all software development is moving." ®

Internet Security Threat Report 2014

More from The Register

next story
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.